
Recent Posts
-
Artefacts supporting risk based security testing
Security testing is used to experimentally check software implementations with respect to their security properties and their resistance to attacks. For security testing we can distinguish functional security testing and security vulnerability testing. Functional security testing checks if the software security functions are implemented correctly and consistent with the security functional requirements. It is used […]
November 20, 2015 / rasen_adm / Comments Off
Read More » -
Artefacts supporting planned security testing
Security testing is used to experimentally check software implementations with respect to their security properties and their resistance to attacks. For security testing we can distinguish functional security testing and security vulnerability testing. Functional security testing checks if the software security functions are implemented correctly and consistent with the security functional requirements. It is used […]
November 20, 2015 / rasen_adm / Comments Off
Read More » -
Security testing – Continuous risk-based testing
Security testing is used to experimentally check software implementations with respect to their security properties and their resistance to attacks. For security testing we can distinguish functional security testing and security vulnerability testing. Functional security testing checks if the software security functions are implemented correctly and consistent with the security functional requirements. It is used […]
November 20, 2015 / rasen_adm / Comments Off
Read More » -
Risk assessment – Real time assessment
Risk assessment is the overall process of risk identification, risk estimation and risk evaluation. Risk identification is the process of finding, recognizing and describing risks. This involves identifying sources of risk, areas of impacts, events (including changes in circumstances), their causes and their potential consequences. Risk identification can involve historical data, theoretical analysis, informed and […]
November 20, 2015 / rasen_adm / Comments Off
Read More » -
Risk assessment – Check list assessment
Risk assessment is the overall process of risk identification, risk estimation and risk evaluation. Risk identification is the process of finding, recognizing and describing risks. This involves identifying sources of risk, areas of impacts, events (including changes in circumstances), their causes and their potential consequences. Risk identification can involve historical data, theoretical analysis, informed and […]
November 20, 2015 / rasen_adm / Comments Off
Read More » -
Legal and compliance assessment – Systematic compliance assessment
Legal and compliance assessment refers to the overall process employed with the objective of adhering to the requirements of laws, industry and organizational standards and codes, principles of good governance and accepted community and ethical standards. The overall process should support, to the extent possible, the documentation of compliance. A systematic compliance assessment follows a […]
November 20, 2015 / rasen_adm / Comments Off
Read More » -
Legal and compliance assessment – Check list based compliance assessment
Legal and compliance assessment refers to the overall process employed with the objective of adhering to the requirements of laws, industry and organizational standards and codes, principles of good governance and accepted community and ethical standards. The overall process should support, to the extent possible, the documentation of compliance. The checklist-based compliance assessment uses a […]
November 20, 2015 / rasen_adm / Comments Off
Read More » -
Legal and compliance assessment – Ad-hoc compliance assessment
Legal and compliance assessment refers to the overall process employed with the objective of adhering to the requirements of laws, industry and organizational standards and codes, principles of good governance and accepted community and ethical standards. The overall process should support, to the extent possible, the documentation of compliance. The compliance assessment is unstructured, does […]
November 18, 2015 / rasen_adm / Comments Off
Read More » -
Security testing – Unstructured testing
Security testing is used to experimentally check software implementations with respect to their security properties and their resistance to attacks. For security testing we can distinguish functional security testing and security vulnerability testing. Functional security testing checks if the software security functions are implemented correctly and consistent with the security functional requirements. It is used […]
November 18, 2015 / rasen_adm / Comments Off
Read More » -
Tool support – None
The key area ‘tool support’ specifies the degree of tool support that is available for the above mentioned key areas. Typically, tools work on their own data structures that are well suited to the task, which needs to be performed with or by the tool. Tool integration is the ability of tools to cooperate with […]
November 18, 2015 / rasen_adm / Comments Off
Read More »